In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.
7.5high severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
03/10/2019
Products1
Rp
Rpyc
by Rpyc Project
27 Versions
5 years ago
Vulnerability Categories2
Missing Authorization
Improperly Controlled Modification of Dynamically-Determined Object Attributes
http://www.vicarius.io
is owned and operated by Vicarius Ltd. (the “Company”). All information contained on the
Website is purely for informational, and educational purposes and should be independently
verified and confirmed. Vicarius does not accept any liability for any loss or damage
whatsoever caused in reliance upon such information or services. No statements or information
presented in any form by Vicarius is intended as fact, and you agree that you will not
consider the statements or information presented on the Website as fact or as a guarantee of
performance.
Related CVEs
Security Research Topics
By Vicarius Studios .
Mar 28, 2024
The Easter Patch Hunt ft. Santa and the Three Sysadmins
By David Parkinson Frost
Mar 21, 2024
David Rambles on Copilot and GPU Spies
By The Meme Bot
Mar 14, 2024
By Shivam Bathla
Mar 10, 2024
Unveiling CVE-2024-21501: Pursuing the abyss - Understanding and exploiting sanitize-html vulnerability, patch, and the root-cause!
Versions below 2.12.1 of the package sanitize-html are vulnerable to path disclosure when used on the backend and with the style attribute allowed, allowing verifying files and folder existence on the system (including project dependencies). An attacker could leverage this vulnerability to gather details about the file system structure and dependencies to perform more targeted attacks against the server. This post details the process of diving into the source code to uncover the root-cause and reveal how insecure usage of the third-party package could lead to seemingly innocuous yet noxious bugs.